1039 Champion's Way Suite 100 Suffolk, VA 23435 - Phone: 757-394-1311


Cyber Operations: Cyber Engineering > Network Operations > Cybersecurity 

CPT provides the Department of Defense (DoD) with network operations (NETOPS) and computer network defense (CND) support to enable authorized users and mission partners the ability to access and share timely and trusted information. Our subject matter experts conduct multi-faceted activities for DoD Cyber Defense Operations Centers and Network Operations Security Centers. Our teams protect, detect, characterize, counter, and mitigate unauthorized activity and vulnerabilities on DoD information networks.

CPT personnel support multi-tiered cybersecurity risk management processes to ensure the confidentiality, integrity, and availability of networks and data therein.  Through our Teams’ efforts, operational resilience is provided with trustworthy information resources, networks and information resources ready for operation, and capabilities to prevail in the face of adverse events.

Network security and information assurance specialists configure and manage network-based and host-based intrusion detection and prevention systems, patch and configure network components, and analyze risk. Our personnel have thorough knowledge of ports, protocols and services (PPS); log file monitoring; file integrity checking; and a diverse range of network components and operating systems. The team conducts traffic analysis, vulnerability analysis, and forensics on abnormal and malicious activity. We identify methods and indicators to improve monitoring and identify malicious activity, remediate vulnerabilities, and support the development of cyber TTP and process improvements.

Key Activities Include:

  • Boundary Defense
  • Host Defense
  • Patch Management
  • Vulnerability Analysis
  • Compliance Assessments
  • Incident Detection & Response
  • Network Engineering
  • Systems Administration
  • Information Assurance
  • Forensics
  • Risk Management

CPT personnel provide continuous monitoring, including 24-hour, 365-day-a-year protection and defense of organizations and operational capabilities. Personnel configure and maintain various cybersecurity products (e.g., firewalls, compliance solutions, file integrity checkers, virus scanners, intrusion detection systems, anti-malware software).

Our cybersecurity workforce maintains DoDD 8570.01 compliance and our personnel have a myriad of qualifications for a wide range of computing environments / operating systems.